| options/nixos/services.prometheus.exporters.mysqld.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.tibber.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.domain.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.shelly.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.script.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.rspamd.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.pihole.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.chrony.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.fastly.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.restic.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.deluge.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.statsd.listenAddress | Address to listen on.
|
| options/nixos/services.couchdb.uriFile | This file contains the full URI that can be used to access this
instance of CouchDB
|
| options/nixos/services.hologram-agent.httpPort | Port for metadata service to listen on.
|
| options/nixos/services.echoip.enablePortLookup | Whether to enable port lookup.
|
| options/nixos/services.windmill.serverPort | Port the windmill server listens on.
|
| options/nixos/services.gotenberg.bindIP | Port the API listener should bind to
|
| options/nixos/services.prometheus.exporters.varnish.instance | varnishstat -n value.
|
| options/nixos/services.neo4j.bolt.listenAddress | Neo4j listen address for BOLT traffic
|
| options/nixos/services.neo4j.http.listenAddress | Neo4j listen address for HTTP traffic
|
| options/nixos/services.prometheus.exporters.varnish.withGoMetrics | Export go runtime and http handler metrics.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.enable | Whether to enable the prometheus imap-mailstat exporter.
|
| options/nixos/hardware.opentabletdriver.daemon.enable | Whether to start OpenTabletDriver daemon as a systemd user service.
|
| options/nixos/services.prometheus.exporters.pgbouncer.logLevel | Only log messages with the given severity or above.
|
| options/nixos/services.nagios.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.moodle.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.ax25.axports.<name>.description | Free format description of this interface.
|
| options/nixos/services.prometheus.exporters.fritz.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fritz.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.postfix.logfilePath | Path where Postfix writes log entries
|
| options/nixos/services.prometheus.exporters.kafka.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.kafka.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.idrac.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.idrac.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.jitsi.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.jitsi.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.v2ray.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.v2ray.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.nginx.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nginx.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.redis.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.redis.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.dmarc.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dmarc.openFirewall is true.
|
| options/nixos/services.redis.servers.<name>.slaveOf | IP and port to which this redis instance acts as a slave.
|
| options/nixos/services.miredo.bindAddress | Depending on the local firewall/NAT rules, you might need to force
Miredo to use a fixed UDP port and or IPv4 address.
|
| options/nixos/services.actual.openFirewall | Whether to open the firewall for the specified port.
|
| options/nixos/services.immich.openFirewall | Whether to open the immich port in the firewall
|
| options/nixos/services.pykms.openFirewallPort | Whether the listening port should be opened automatically.
|
| options/nixos/services.prometheus.exporters.nut.nutVariables | List of NUT variable names to monitor
|
| options/nixos/services.prometheus.exporters.sabnzbd.servers.*.baseUrl | Base URL of the sabnzbd server.
|
| options/nixos/services.prometheus.exporters.opnsense.apiSecretFile | File containing the api secret.
|
| options/nixos/services.prometheus.exporters.mailman3.group | Group under which the mailman3 exporter shall be run.
|
| options/nixos/services.prometheus.exporters.snmp.enableConfigCheck | Whether to run a correctness check for the configuration file
|
| options/nixos/services.prometheus.exporters.varnish.varnishStatPath | Path to varnishstat.
|
| options/nixos/services.prometheus.exporters.nvidia-gpu.listenAddress | Address to listen on.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer.
|
| options/nixos/services.prometheus.exporters.nginx.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.prometheus.exporters.node-cert.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.node-cert.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.mikrotik.configFile | Path to a mikrotik exporter configuration file
|
| options/nixos/services.porn-vault.openFirewall | Whether to open the Porn-Vault port in the firewall.
|
| options/nixos/services.statsd.graphitePort | Port of Graphite server (i.e. carbon-cache).
|
| options/nixos/services.prometheus.exporters.mailman3.logLevel | Detail level to log.
|
| options/nixos/services.prometheus.exporters.unpoller.loki.interval | How often the events are polled and pushed to Loki.
|
| options/nixos/services.prometheus.exporters.kea.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.kea.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.nut.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nut.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.lnd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.lnd.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.pve.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.pve.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.frr.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.frr.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.sql.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.sql.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.zfs.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.zfs.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.smartctl.devices | Paths to the disks that will be monitored
|
| options/nixos/services.avahi.openFirewall | Whether to open the firewall for UDP port 5353
|
| options/nixos/services.bosun.opentsdbHost | Host and port of the OpenTSDB database that stores bosun data
|
| options/nixos/services.polipo.socksParentProxy | Hostname and port number of an SOCKS parent proxy;
it should have the form ‘host:port’.
|
| options/nixos/services.prometheus.exporters.rasdaemon.enable | Whether to enable the prometheus rasdaemon exporter.
|
| options/nixos/services.prometheus.exporters.nextcloud.enable | Whether to enable the prometheus nextcloud exporter.
|
| options/nixos/services.prometheus.exporters.dnssec.resolvers | DNSSEC capable resolver to be used for the check.
|
| options/nixos/services.prometheus.exporters.surfboard.enable | Whether to enable the prometheus surfboard exporter.
|
| options/nixos/services.prometheus.exporters.borgmatic.enable | Whether to enable the prometheus borgmatic exporter.
|
| options/nixos/services.prometheus.exporters.wireguard.enable | Whether to enable the prometheus wireguard exporter.
|
| options/nixos/services.prometheus.exporters.pgbouncer.enable | Whether to enable the prometheus pgbouncer exporter.
|
| options/nixos/services.prometheus.exporters.tailscale.enable | Whether to enable the prometheus tailscale exporter.
|
| options/nixos/services.prometheus.exporters.smokeping.enable | Whether to enable the prometheus smokeping exporter.
|
| options/nixos/services.firezone.relay.lowestPort | The lowest port to use in TURN allocation
|
| options/nixos/services.prometheus.exporters.rtl_433.extraFlags | Extra commandline options to pass to the rtl_433 exporter.
|
| options/nixos/services.chisel-server.reverse | Allow clients reverse port forwarding
|
| options/nixos/services.ipfs-cluster.openSwarmPort | Open swarm port, secured by the cluster secret
|
| options/home-manager/launchd.agents.<name>.config.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/services.prometheus.exporters.junos-czerwonk.enable | Whether to enable the prometheus junos-czerwonk exporter.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.local_ts | List of local traffic selectors to include in CHILD_SA
|
| options/nixos/services.prometheus.exporters.buildkite-agent.user | User name under which the buildkite-agent exporter shall be run.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.extraFlags | Extra commandline options to pass to the imap-mailstat exporter.
|
| options/nixos/services.prometheus.exporters.flow.partitions | The number of the partitions to consume, none means all.
|
| options/nixos/services.beszel.agent.openFirewall | Whether to open the firewall port (default 45876).
|
| options/nixos/networking.networkmanager.ethernet.macAddress | Set the MAC address of the interface.
"XX:XX:XX:XX:XX:XX": MAC address of the interface
"permanent": Use the permanent MAC address of the device
"preserve": Don’t change the MAC address of the device upon activation
"random": Generate a randomized value upon each connect
"stable": Generate a stable, hashed MAC address
|
| options/nixos/services.prometheus.exporters.pve.collectors.config | Collect PVE onboot status
|
| options/nixos/services.easytier.instances.<name>.settings.listeners | Listener addresses to accept connections from other peers
|
| options/nixos/services.prometheus.exporters.scaphandre.user | User name under which the scaphandre exporter shall be run.
|
| options/nixos/services.prometheus.exporters.storagebox.user | User name under which the storagebox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pve.collectors.status | Collect Node/VM/CT status
|
| options/nixos/services.stargazer.listen | Address and port to listen on.
|
| options/nixos/services.prometheus.exporters.apcupsd.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.ecoflow.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.sabnzbd.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.unbound.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.dovecot.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.bitcoin.listenAddress | Address to listen on.
|